Cisco Blogs


Cisco Blog > Partner

If Time is Money, Then it’s Time to Rethink BYOD

Ken Trombetta Cisco blog - 10 31 13When Benjamin Franklin coined the famous phrase, “time is money,” I am sure the advances of mobile technology were not on his mind. However, the adage is more relevant now than ever before as organizations evaluate their mobility and Bring Your Own Device (BYOD) strategies.

BYOD is Here to Stay

Earlier this year we announced the results of the Cisco IBSG BYOD Financial Impact study. The global research revealed interesting statistics about the financial impact of BYOD including:

  • Mobile users are willing to invest in BYOD. Mobile employees who BYOD (“BYOD-ers”) spend on average $965 on their devices, and use 1.7 personal devices for work. They spend an additional $734 per year on voice and data plans for their BYOD devices.
  • BYOD is delivering productivity gains around the world. Even with a broad mix of BYOD implementation levels, the typical company is, on average, saving money and its employees are more productive.
  • Comprehensive BYOD pays for itself in hard cost savings. Apart from productivity gains, the major cost savings are in three areas: hardware, support and telecommunications costs. Read More »

Tags: , , , , ,

An Architectural Approach to Mobility

When it comes to mobility, everyone is learning fast in order to keep up. With what seems like daily advances in mobile technology and rapid consumer adoption, it is not getting any easier for organizations to break the cycle of reactive IT decision making. For many of our customers, enterprise mobility happened to them and the initial supporting architecture was built at light speed to respond to the demands of the business. While this approach was necessary to stop the deluge, it didn’t put all of the pieces in place to enable organizations to adapt the continuous change and emerging new realities of mobility. For instance:

  • Users now connect to the network with three or more mobile/WLAN devices such as laptops, tablets and smartphones, resulting in complex wireless infrastructures and network bottlenecks.
  • Inconsistent management tools and policies across the wired and wireless segments of the network increase the burden for network managers and drive up management costs and complexity.
  • Employees demand access from devices not only within the corporation, but also beyond the firewall.
  • Risk management dictates that corporate data must remain protected.

The need to balance productivity with security and coordinate business justification with the various line of business (LOB) owners has never been greater. IT leaders who want to break out of the reactive cycle of just keeping up must take a step back to evaluate what’s coming next. What changes are on the horizon? How will it impact my network? How can my network help me adapt to the changing needs of my employees?

Read More »

Tags: , , , , ,

The Future of Any-to-Any Collaboration Depends on Satisfying Today’s Mobile User Demands

When we think of the term “collaboration” we can often get trapped in the cycle of thinking that it only applies to IT departments and the bottom line. However, it’s important to consider how the role of the enterprise is shifting thanks to the consumerization of IT. For example, how can IT leaders satisfy new user demands while unleashing the power of a sound mobile strategy?

With today’s technology-driven global economy, enterprise mobility and collaboration tools need to be about connecting communities, not just companies. Never has there been a time when more business processes extend beyond headquarters. Organizations need to enable all types of connections: From the mobile worker to the teleworker, from other businesses to target consumers, from traditional branch offices to the cloud. This any-to-any type of collaboration is no longer keeping the enterprise at the center. Instead, the future is driven by all types of users.

It’s clear that users expect to collaborate anywhere, on any device, with any workload. They want to collaborate like they’re in the office regardless of their location. IT leaders must keep user demands top-of-mind when working to deploy a BYOD policy. This can create challenges and opportunities in five key areas:

Brett Belding - Collaboration

Join the conversation on Twitter, #CiscoYourWay

Read More »

Tags: , , , , , , ,

Cybersecurity: Where are the Biggest Threats?

Rarely a week goes by that we don’t hear of a database compromise that results in confidential data—many times consisting of personally identifiable information (PII)—falling into the hands of those who should not have access to the data. Protection of our PII is becoming increasingly critical as more and more information is collected and stored through the use of Internet-enabled devices.

The following is an excerpt from a recent post by Patrick Finn, Senior Vice President of Cisco’s U.S. Public Sector Organization, that focuses on the threat of data breaches impacting government organizations and provides some guidelines for how these organizations can assess and remediate these threats.

“Cyber crimes, cyber thievery, and cyber warfare have become an everyday reality. In fact, security breaches are so prevalent that, according to a new study from the National Cyber Security Alliance and a private sector firm, 26 percent of Americans have been the victims of a data breach in the past 12 months alone. Not only do breaches reduce citizens’ trust in government to protect their confidential data, they also cost government agencies a significant amount of money. For most CIOs and other government keepers of data, these statistics prompt one immediate question – “Can this happen to us?” Unfortunately, the answer to this question is: yes, it can.”

For more on this topic please visit Patrick Finn’s entire post over on the Cisco Government Blog.

Tags: , , , , ,

How does Cisco Access Switching help address BYOD, Mobility and Security Needs?

Cisco will host a live webcast on Wedn November 13, 2013 to discuss BYOD, mobility, security and how Cisco access switching address these customer needs. If you are reading this blog, there is a good chance that your work is somehow related to these critical areas. To test how widely BYOD, mobility and security impact IT professionals, I’ve used an unscientific way to check it out on several popular online IT web sites. I want to see if they consider at least one of these areas to be their main focus.  Here’s what I’ve found – many of them (although not every single one) are devoted to at least one area. Read More »

Tags: , , , , , , , , ,